Apple has released an update to the vulnerability.

Apple has confirmed serious vulnerabilities for iPhones, iPads and Macs that could allow attackers to take full control of these devices. The company also states that these vulnerabilities may have already been exploited.

Apple has released new updates against the emerging vulnerability

Apple released two security reports the other day. Security experts advised users to update affected devices. It was stated that iPhone 6S and later models, all fifth generation and later iPad models, all iPad Pro models including iPad Air 2 and Mac computers with MacOS Monterey support are affected by this vulnerability. In addition, some iPod owners are warned against this situation.

3nm M2 Pro surprise from Apple! Date given

Apple may have started production for the 3nm M2 Pro. All details about the new M2 series to be produced with TSMC’s 3nm process.

Due to this vulnerability, malware can get the highest level of permission on the device. It is stated that with the permission offered at the highest level, any command can be performed on the device and full control over the device can be achieved.

It has been revealed that in almost all Apple models, malicious people can gain full administrative access to the device. It is stated that this vulnerability is eliminated with the software update, and users are recommended to install these updates as soon as possible.

The company did not provide details on how many users were affected by the vulnerability. On this subject, Apple points to an anonymous researcher. The company released macOS Monterey 12.5.1 and iOS 15.6.1/iPadOS 15.6.1 updates to fix this vulnerability.

The company had previously admitted to similar vulnerabilities. It is thought that most Apple users may have been affected by this and many other events. Although Apple reacts to such situations in a short time, some users may be adversely affected by security vulnerabilities.

So what do you think about Apple’s vulnerability? You can share your views with us in the comments section.

source site-28